Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Hierarchies in Contextual Role- Based Access Control Model (C-RBAC)
Muhammad Nabeel Tahir
Pages - 28 - 42 | Revised - 15-8-2008 | Published - 15-11-2008
MORE INFORMATION
KEYWORDS
Access Control, RBAC, Purpose Role, Spatial Role, Location Modeling.
ABSTRACT
Hierarchical representation is a natural way of organizing roles in role-based
access control systems. Besides its advantages of providing a way of
establishing parent-child relationships among different roles, it also provides a
facility to design and organize context dependant application roles that users
may activate depending on their current context (spatial, temporal) conditions. In
this paper, we show that if spatial roles are organized in hierarchical
relationships, it can cause the problem of disambiguation in making access
control decisions especially when the user moves from one location to another
location frequently in a single transaction and a single session. We extend our
work of Contextual Role-Based Access Control (C-RBAC) by introducing
hierarchical relationship among subject, location and purpose roles and solve the
disambiguation problem in hierarchy by considering user motion direction and
his/her context roles (spatial and spatial purpose) in order to make more fine
grained and better access control decisions.
1 | Grebenik, V. V., & Abraham, P. (2012). U.S. Patent No. 8,255,419. Washington, DC: U.S. Patent and Trademark Office. |
2 | W. Tang, M. Chen, J. Ni and X. Yang "Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems". Sensors, 11(7), pp. 6743-6759. 2011. |
3 | W. Tang, J. Ni, M. Chen and X. Yang, ?Contextual Role-Based Security Enhancement Mechanism for 2G-RFID Systems?, in Proceedings, Computer Communications Workshops (INFOCOM WKSHPS), IEEE Conference, Shanghai, 10-15 April 2011, pp. 942-946. |
4 | S. Gkarafli and A. A. Economides, "Comparing The Proof By Knowledge Authentication Techniques", International Journal of Computer Science and Security (IJCSS), 4(2), pp. 237 - 255, 2010. |
5 | M. N. Tahir, "Purpose Engineering for Contextual Role-Based Access Control (C-RBAC)", International Journal of Engineering (IJE), 2(3), pp. 41 - 50, 2008. |
A. Hameed, M. N. Tahir, S. Rehman. Impact of Role-Based Access Control in e-Governance. In Proceedings of 3rd International Conference on E-Governance, Lahore, Pakistan, 2005. | |
Byun J, Bertino E, Ninghui L. Purpose Based Access Control for Privacy Protection in Relational Database Systems. Technical Report 2004-52, Purdue University, USA, 2004. | |
Constantine E. A role-based framework for distributed systems management. PhD Thesis, University of London, July 1998. | |
Covington MJ, Moyer MJ, Ahmad M. Generalized role-based access control for securing future applications. In Proceedings of the 23rd National Information Systems Security Conference. Baltimore, MD, USA, 2000. | |
Gramm-Leach-Bliley Act (GLB Act): U.S. Senate Committee on Banking, Housing, and Urban Affairs http://banking.senate.gov/conf | |
http://www.google.com/search?hl=en&rlz=1T4GFRC_en___MY202&defl=en&q=define:purpose&sa=X&oi= glossary_definition&ct=title | |
Joshi JBD, Bertino E, Latif U, Ghafoor A. A generalized temporal role-based access control model. IEEE Transactions on Knowledge and Data Engineering, 17(1): 4-23, 2005. | |
Lee KH. A Distributed Network Management System with Multi-level Domain Approach. In Proceedings of International Conference on Communication Systems ICCS 1994; 789-793, Singapore. | |
S. Chandaran and J. Joshi. LoT-RBAC: A location and time-based RBAC model. In Proceedings of the 6th International Conference on Web Information Systems Engineering (WISE’05). Page(s): 361-375, NewYork, USA, 2005. | |
Sandhu R, Ferraiolo D, Kuhn R. The NIST Model for Role-Based Access Control: Towards A Unified Standard. In Proceedings of 5th ACM Workshop on Role-Based Access Control, 47-63, Berlin, Germany, 2000 | |
Sloman M. Policy Driven Management for Distributed Systems. Journal of Network and Systems Management; 2(4): 333-361, 1994. | |
Tahir N. Contextual Role-Based Access Control, Ubiquitous Computing and Communication Journal, 2(3), 2007 | |
Yasuda M, Tachikawa T, Takizawa M. A purpose-oriented access control model. In Proceedings of 13th International Conference on Information Networking, 168-173, Cheju, Korea, 1998. | |
[15] . Yialelis N, Sloman M. A Security Framework Supporting Domain-Based Access Control in Distributed Systems. In Proceedings of IEEE ISOC Symposium on Network and Distributed Systems Security'96 1996; 26-34, San Diego | |
[1] . Health Insurance Portability & Accountability Act http://www.hipaa.org | |
[20] . Personal Information Protection and Electronic Documents Act http://www.nymity.com/pipeda/ | |
[2] . Hansen F, Oleshchuk V. Spatial role-based access control model for wireless networks. In Proceedings of 58th IEEE Vehicular Technology Conference (VTC’03), 2093-2097, Orlando, Florida, 2003 | |
[3] . Bertino E, Catania B, Damiani ML, Persasca P. GEO-RBAC: A Spatially Aware RBAC. In Proceedings of 10th Symposium on Access Control Models and Technologies (SACMAT'05), 29-37, 2005 | |
[4] . Corradi A, Montanari R, Tibaldi D. Context-based Access Control in Ubiquitous Environments. In Proceedings of 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), 253-260, 2004 | |
[5] . Fu S, Xu C. A Coordinated Spatio-Temporal Access Control Model for Mobile Computing in Coalition Environments. In Proceedings of 19th IEEE International Conference on Parallel and Distributed Processing, 289b-289b, Denver, CA, USA, 2005. | |
[6] . Joshi JBD, Bertino E, Shafiq B, Ghafoor A. Dependencies and Separation of Duty Constraints in GTRBAC. In Proceedings of 8th ACM Symposium on Access Control Models and Technologies, 51-64, Como, Italy, 2003. | |
[8] . Joshi JBD, Bertino E, Ghafoor A. Analysis of Expressiveness and Design Issues for a Generalized Temporal Role Based Access Control Model. IEEE Transactions on Dependable and Secure Computing, 2(2):157-175, 2005 | |
Mr. Muhammad Nabeel Tahir
- Malaysia
m_nabeeltahir@yahoo.com
|
|
|
|
View all special issues >> | |
|
|